Viking Cipher

Cybersecurity News

Dark Reading

The Hackers News

KrebsOnSecurity

  • Scammers Unleash Flood of Slick Online Gaming Sites
    July 30, 2025

    Fraudsters are flooding Discord and other social media platforms with ads for hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. Here's a closer look at the social engineering tac...

  • Phishers Target Aviation Execs to Scam Customers
    July 24, 2025

    KrebsOnSecurity recently heard from a reader whose boss's email account got phished and was used to trick one of the company's customers into sending a large payment to scammers. An investigation into the attacker's infrastructure points to a long-running Nigerian cybercrime group tha...

  • Microsoft Fix Targets Attacks on SharePoint Zero-Day
    July 21, 2025

    On Sunday, July 20, Microsoft Corp. issued an emergency security update for a vulnerability in SharePoint Server that is actively being exploited to compromise vulnerable organizations. The patch comes amid reports that malicious hackers have used the Sharepoint flaw to breach U.S. federal and state...

  • Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
    July 18, 2025

    Security researchers recently revealed that the personal information of millions of people who applied for jobs at McDonald's was exposed after they guessed the password ("123456") for the fast food chain's account at Paradox.ai, a company that makes artificial intelligence based...

  • DOGE Denizen Marko Elez Leaked API Key for xAI
    July 15, 2025

    Marko Elez, a 25-year-old employee at Elon Musk's Department of Government Efficiency (DOGE), has been granted access to sensitive databases at the U.S. Social Security Administration, the Treasury and Justice departments, and the Department of Homeland Security. So it should fill all Americans...

  • UK Arrests Four in ‘Scattered Spider’ Ransom Group
    July 10, 2025

    Authorities in the United Kingdom this week arrested four alleged members of "Scattered Spider," a prolific data theft and extortion group whose recent victims include multiple airlines and the U.K. retail chain Marks & Spencer....

  • Microsoft Patch Tuesday, July 2025 Edition
    July 9, 2025

    Microsoft today released updates to fix at least 137 security vulnerabilities in its Windows operating systems and supported software. None of the weaknesses addressed this month are known to be actively exploited, but 14 of the flaws earned Microsoft's most-dire "critical" rating, me...

  • Big Tech’s Mixed Response to U.S. Treasury Sanctions
    July 3, 2025

    In May 2025, the U.S. government sanctioned a Chinese national for operating a cloud provider linked to the majority of virtual currency investment scam websites reported to the FBI. But more than a month later, the accused continues to openly operate accounts at a slew of American tech companies, i...

  • Senator Chides FBI for Weak Advice on Mobile Security
    June 30, 2025

    Agents with the Federal Bureau of Investigation (FBI) briefed Capitol Hill staff recently on hardening the security of their mobile devices, after a contacts list stolen from the personal phone of the White House Chief of Staff Susie Wiles was reportedly used to fuel a series of text messages and ph...

  • Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
    June 12, 2025

    Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising technology that powers a sprawling ecosystem of online hucksters and website hackers. A new report...

Wired (Security Section)

HackRead

CyberScoop

Help Net Security

  • Cyera launches AI Guardian to secure all types of AI systems
    August 4, 2025

    Cyera launched AI Guardian, a solution built to secure any type of AI. It expands Cyera’s platform to meet the needs of enterprises adopting AI at scale, anchored by two core products: AI-SPM, providing inventory on all AI assets at a granular level, and AI Runtime Protection, monitoring and respo...

  • LastPass unveils SaaS Protect to clamp down on shadow IT, AI risks
    August 4, 2025

    Building on the company’s existing SaaS Monitoring capabilities, LastPass SaaS Protect introduces a set of policy enforcements that enable organizations to move from passive visibility into proactive access control. Business benefits include: Real-time SaaS governance: Quickly restrict access to u...

  • CyberSaint’s new AI tool tells you which threats matter
    August 4, 2025

    CyberSaint launched AI-Powered Findings Management within the CyberStrong platform. This new feature, powered by the company’s proprietary CyberSaint AI engine, transforms how CISOs and team prioritize threats by dynamically ingesting security telemetry, emerging threats, cyber loss data and a cus...

  • SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
    August 4, 2025

    Attackers wielding the Akira ransomware and possibly a zero-day exploit have been spotted targeting SonicWall firewalls since July 15, 2025. “In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access through SonicW...

  • AIBOMs are the new SBOMs: The missing link in AI risk management
    August 4, 2025

    In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to security issues that conventional tools fail to detect. He explains how AI Bills of Materials (AIBOMs) extend SBOMs to provide ...

  • Average global data breach cost now $4.44 million
    August 4, 2025

    IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance. While the overall number of organizations experiencing an AI-related breach is a small representation of the researched population, this is the first time security, governance a...

  • Open-source password recovery utility Hashcat 7.0.0 released
    August 4, 2025

    Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms. It runs on CPUs, GPUs, and other hardware accelerators across Linux, Windows, and macOS, and includes features for distributed password cracking at scale. Hashcat 7...

  • The surprising truth about identity security confidence
    August 4, 2025

    Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The study reveals a troubling gap between what organizations believe about their identity security programs and how they actually behave. Surprisingly, those expressing the ...

  • What’s keeping risk leaders up at night? AI, tariffs, and cost cuts
    August 4, 2025

    Enterprise risk leaders are most concerned about rising tariffs and trade tensions heading into the second half of 2025, according to a new report from Gartner. The firm’s second-quarter Emerging Risk Report, based on a survey of 223 senior risk, audit, and compliance executives, ranks the escalat...

  • Week in review: Food sector cybersecurity risks, cyber threats to space infrastructure
    August 3, 2025

    Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: LLM Engineer’s Handbook For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. LLM Engineer’s Handbook aims to fill that gap. Vuln...

ZDNet (Security Section)

Security Boulevard

  • OWASP LLM Risk #5: Improper Output Handling – FireTail Blog
    August 4, 2025

    Aug 04, 2025 - Lina Romero - 2025 is seeing an unprecedented surge of cyber attacks and breaches. AI, in particular, has introduced a whole new set of risks to the landscape and researchers are struggling to keep up. The OWASP Top 10 Risks for LLMs goes into detail about the ten most prevalent risks...

  • Scaling Security with NHIs in Mind
    August 4, 2025

    Why is Scalable Security Crucial in Today’s Digital Landscape? Businesses must be agile, adaptable, and prepared to scale their operations. This emphasizes the need not only for operational scalability but also for scalable security. But what does this entail? Scalable security refers to security ...

  • Ensuring Stability in Your Cybersecurity Approach
    August 4, 2025

    Why Secure Non-Human Identities for Relationship Building? Are you taking all the necessary steps for a comprehensive cybersecurity strategy? If Non-Human Identities (NHIs) and Secrets Management aren’t a significant part of your approach, you may be exposing your business to considerable risk lev...

  • Building Trust Through Robust Secrets Management
    August 4, 2025

    Does Your Security Strategy Include a Non-Human Identities Management Plan? Organizations recognize that cybersecurity is a top priority, but few understand the critical role Non-Human Identities (NHIs) play in a robust security strategy. When machines interact more frequently with sensitive data, e...

  • Elevate Your Influence: Building a Personal Brand in Tech 2025
    August 4, 2025

    why building a personal brand in tech is crucial for career success in 2025. Start your journey today and stand out in the competitive landscape! The post Elevate Your Influence: Building a Personal Brand in Tech 2025 appeared first on Security Boulevard. ...

  • BSidesSF 2025: Tracking The World’s Dumbest Cyber Mercenaries
    August 4, 2025

    Creators/Authors/Presenters: Cooper Quintin, Eva Galperin Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon -...

  • How AI Ticketing Systems Are Streamlining IT Support in the Age of Content Streaming
    August 4, 2025

    Discover how AI ticketing systems are helping to streamline IT support and business operations in the age of the content streaming world in 2025 The post How AI Ticketing Systems Are Streamlining IT Support in the Age of Content Streaming appeared first on Security Boulevard. ...

  • What Is A Software Bill of Materials (SBOM) & 4 Critical Benefits
    August 4, 2025

    Learn how SBOMs improve transparency, security, and compliance. The post What Is A Software Bill of Materials (SBOM) & 4 Critical Benefits appeared first on Security Boulevard. ...

  • Randall Munroe’s XKCD ‘iNaturalist Animals And Plants’
    August 4, 2025

    via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘iNaturalist Animals And Plants’ appeared first on Security Boulevard. ...

  • Survey: Network Security Challenges Persist Despite Desire to Modernize
    August 4, 2025

    A survey of 1,000 IT, security and engineering professionals based in North America finds that most organizations are still struggling to manage and secure access to corporate networks. The post Survey: Network Security Challenges Persist Despite Desire to Modernize appeared first on Security Boule...